Mobile phone-based identity identification and near-field payment method
A technology for identification and near-field payment, which is applied in the fields of mobile payment, wireless communication, mobile identification, and access control authentication. It can solve the problems of easy loss of identity identification carrier, complicated operation, and inconvenient portability, so as to facilitate work, life, and operation. Convenience and high safety effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0045] Example 1: Near Field Payment
[0046] On the basis of the bank's existing security strategy, cooperate with the corresponding business process to bind the mobile phone card or mobile phone number with the bank card or bank account one-to-one, one-to-many, and many-to-one. Through the identifiability and uniqueness of the mobile phone card or mobile phone number of the operator's communication network, the mobile phone user is authenticated, and in the process of real-time communication, the identity certification of the mobile near-field payment or mobile phone transfer process is ensured.
[0047] The specific operation steps are as follows:
[0048] (1) A payment transaction server is added to the banking system, which is connected to the identity authentication server and the banking system respectively. The payment transaction server is responsible for managing the transaction behavior and transaction authority of the receiver and the payer, and submitting the pay...
Embodiment 2
[0051] Embodiment 2: access control identification
[0052] On the basis of the original access control system, mobile phone access control is added. Through the identifiability and uniqueness of the mobile phone card or mobile phone number of the communication operator, the mobile phone user is authenticated. According to the authentication result, the mobile phone connected to the access control host Send a message to the access control host to realize the opening and closing of the system.
[0053] The specific operation steps are as follows:
[0054] 1. Cooperate with the property and security department to add an access control mobile phone to the control host of the access control system, and connect with the application server and the access control host respectively (via USB interface), and open the bluetooth connection; and the application server behind the Internet gateway to establish an intermediate database for the one-to-one binding relationship between the use...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com